{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T07:22:56Z","timestamp":1761895376124},"reference-count":26,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2012,6,1]],"date-time":"2012-06-01T00:00:00Z","timestamp":1338508800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE\/ACM Trans. Networking"],"published-print":{"date-parts":[[2012,6]]},"DOI":"10.1109\/tnet.2011.2171057","type":"journal-article","created":{"date-parts":[[2011,10,24]],"date-time":"2011-10-24T20:22:50Z","timestamp":1319487770000},"page":"715-728","source":"Crossref","is-referenced-by-count":24,"title":["Adaptive Selective Verification: An Efficient Adaptive Countermeasure to Thwart DoS Attacks"],"prefix":"10.1109","volume":"20","author":[{"given":"Sanjeev","family":"Khanna","sequence":"first","affiliation":[]},{"given":"Santosh S.","family":"Venkatesh","sequence":"additional","affiliation":[]},{"given":"Omid","family":"Fatemieh","sequence":"additional","affiliation":[]},{"given":"Fariba","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Carl A.","family":"Gunter","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1145\/1402946.1402981","article-title":"To filter or to authorize: Network-layer DoS defense against multimillion-node botnets","volume":"38","author":"liu","year":"2008","journal-title":"Comput Commun Rev"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/571697.571724"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2001.991558"},{"key":"ref13","article-title":"Two root servers targeted by botnet","author":"mcmillan","year":"2007","journal-title":"PC Advisor"},{"key":"ref14","article-title":"Twitter, Facebook attack targeted one user","author":"mills","year":"2009","journal-title":"CNET News"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1132026.1132027"},{"key":"ref16","author":"poulsen","year":"2004","journal-title":"FBI Busts Alleged DDoS Mafia"},{"key":"ref17","article-title":"Georgia accuses Russia of waging `cyber-war'","author":"richards","year":"2008","journal-title":"Times Online"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/90.929847"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/NPSEC.2005.1532046"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2009.02.069"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1064340.1064341"},{"key":"ref6","first-page":"426","article-title":"On memory-bound functions for fighting spam","author":"dwork","year":"2003","journal-title":"Proc Crypto"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1962.10480667"},{"key":"ref8","article-title":"DoS protection for reliably authenticated broadcast","author":"gunter","year":"2004","journal-title":"NDSS"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2535"},{"key":"ref2","article-title":"Three botnets responsible for half of all computer infections","year":"2010","journal-title":"Infosecurity Mag"},{"key":"ref9","author":"kaufman","year":"2009","journal-title":"Internet key exchange (IKEv2) protocol"},{"key":"ref1","year":"1998","journal-title":"Smurf attack"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/11925071_14"},{"key":"ref22","first-page":"78","article-title":"Defending against denial-of-service attacks with puzzle auctions","author":"wang","year":"2003","journal-title":"Proc IEEE Symp Security Privacy"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1145\/1151659.1159948","article-title":"DDoS defense by offense","author":"walfish","year":"2006","journal-title":"Proc ACM Sigcomm"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2007.914506"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301320"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2006.877137"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2004.842221"}],"container-title":["IEEE\/ACM Transactions on Networking"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/90\/6216496\/06056588.pdf?arnumber=6056588","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,10]],"date-time":"2021-10-10T23:52:12Z","timestamp":1633909932000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6056588\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6]]},"references-count":26,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tnet.2011.2171057","relation":{},"ISSN":["1063-6692","1558-2566"],"issn-type":[{"value":"1063-6692","type":"print"},{"value":"1558-2566","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,6]]}}}